Analysis

  • max time kernel
    103s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-03-2023 06:56

General

  • Target

    51989f4b92a563c5cde279ed8cff0b448f89223a66c46bc8e6cd4d3103ba980b.exe

  • Size

    1.2MB

  • MD5

    0d450d454f1081019e6d2f82cb3a46fd

  • SHA1

    fa5da1b4ba72616f39e85c25f74d90bbf187ad5d

  • SHA256

    51989f4b92a563c5cde279ed8cff0b448f89223a66c46bc8e6cd4d3103ba980b

  • SHA512

    d8af74f7eeac6d226da7488d32b8f9bef4205fc4efc4bf82c8fc478c823fc81549c86a79028c69406d6dcf010006a434c376025fae76479f4e5031055f24381c

  • SSDEEP

    24576:a3fA/X9x8NfB7bCvJpAaUQMz5itmXaZH/BV:aISfBnyXAPFQis

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

laba

C2

193.233.20.28:4125

Attributes
  • auth_value

    2cf01cffff9092a85ca7e106c547190b

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51989f4b92a563c5cde279ed8cff0b448f89223a66c46bc8e6cd4d3103ba980b.exe
    "C:\Users\Admin\AppData\Local\Temp\51989f4b92a563c5cde279ed8cff0b448f89223a66c46bc8e6cd4d3103ba980b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino8130.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino8130.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2388
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino3054.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino3054.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3332
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0208.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0208.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3988
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus1247.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus1247.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:232
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con8568.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con8568.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2548
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dyj65s59.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dyj65s59.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4796
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 2004
            5⤵
            • Program crash
            PID:1340
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en485508.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en485508.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:220
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge185996.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge185996.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3612
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3876
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3100
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1088
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:432
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:4548
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:5048
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:2548
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:1396
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:3396
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 484
                  2⤵
                  • Program crash
                  PID:3448
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4796 -ip 4796
                1⤵
                  PID:1752
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 748 -ip 748
                  1⤵
                    PID:3512
                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    1⤵
                    • Executes dropped EXE
                    PID:60

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Execution

                  Scheduled Task

                  1
                  T1053

                  Persistence

                  Modify Existing Service

                  1
                  T1031

                  Registry Run Keys / Startup Folder

                  1
                  T1060

                  Scheduled Task

                  1
                  T1053

                  Privilege Escalation

                  Scheduled Task

                  1
                  T1053

                  Defense Evasion

                  Modify Registry

                  3
                  T1112

                  Disabling Security Tools

                  2
                  T1089

                  Credential Access

                  Credentials in Files

                  2
                  T1081

                  Discovery

                  Query Registry

                  2
                  T1012

                  System Information Discovery

                  2
                  T1082

                  Collection

                  Data from Local System

                  2
                  T1005

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge185996.exe
                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge185996.exe
                    Filesize

                    226KB

                    MD5

                    8627ebe3777cc777ed2a14b907162224

                    SHA1

                    06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                    SHA256

                    319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                    SHA512

                    9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino8130.exe
                    Filesize

                    844KB

                    MD5

                    856dd077cd7ab2ff18bc21cfcb433b7f

                    SHA1

                    1c3f81147cfc5668343c1a04dc89214fc1c63a23

                    SHA256

                    21b6c9639237b095f4ff32f54ae7790ce419f8a607443f234d11a8da8f0a4f49

                    SHA512

                    d289b0a68f87af28587fad1ff719c966aae55c4abd7a72d743c23fabc7d6d485f56c0d9195ea7a8212d0f310608283f7d1938e578a39fd8c8198e7b3b9f254f8

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino8130.exe
                    Filesize

                    844KB

                    MD5

                    856dd077cd7ab2ff18bc21cfcb433b7f

                    SHA1

                    1c3f81147cfc5668343c1a04dc89214fc1c63a23

                    SHA256

                    21b6c9639237b095f4ff32f54ae7790ce419f8a607443f234d11a8da8f0a4f49

                    SHA512

                    d289b0a68f87af28587fad1ff719c966aae55c4abd7a72d743c23fabc7d6d485f56c0d9195ea7a8212d0f310608283f7d1938e578a39fd8c8198e7b3b9f254f8

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en485508.exe
                    Filesize

                    175KB

                    MD5

                    478e884952392c14b85cca1a6a4f3e35

                    SHA1

                    f3475db1427fec3eedf583f1b7b0f839b27f8d74

                    SHA256

                    bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413

                    SHA512

                    b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en485508.exe
                    Filesize

                    175KB

                    MD5

                    478e884952392c14b85cca1a6a4f3e35

                    SHA1

                    f3475db1427fec3eedf583f1b7b0f839b27f8d74

                    SHA256

                    bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413

                    SHA512

                    b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino3054.exe
                    Filesize

                    702KB

                    MD5

                    572e3d67932761f71aa9fa66f2f6412e

                    SHA1

                    50f7586a5a493947247b2762a5b83146557683f5

                    SHA256

                    0c729989cb699f227214671d68aa3e9add92f670cb955b2f63045fdcfc6e6c0b

                    SHA512

                    633e4b188de85fbe70c5f05da30f7d64c1fc5524c32d43674720eee726ed10702f751c9b0adeede72b427018d3d089958fa13b78ec7e8a03d0576c1a21a33220

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino3054.exe
                    Filesize

                    702KB

                    MD5

                    572e3d67932761f71aa9fa66f2f6412e

                    SHA1

                    50f7586a5a493947247b2762a5b83146557683f5

                    SHA256

                    0c729989cb699f227214671d68aa3e9add92f670cb955b2f63045fdcfc6e6c0b

                    SHA512

                    633e4b188de85fbe70c5f05da30f7d64c1fc5524c32d43674720eee726ed10702f751c9b0adeede72b427018d3d089958fa13b78ec7e8a03d0576c1a21a33220

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dyj65s59.exe
                    Filesize

                    395KB

                    MD5

                    cfd9fd906ad91a1f8e95e9629b589e4d

                    SHA1

                    1bd0d089b9c491f18cd738d73933b70ce2e35f6a

                    SHA256

                    35bd0e6db97e955e502ca62513ed082b9b8dc3f2972cd6b95c275a1f0b131af3

                    SHA512

                    611a5e0706b30016926c3296a9596ab46ae7ed684d5ba6e9013cc3beaf8a35f7802c15179cf6e76304380e1aa70f294fccf6bf56042f910d7d161f2188b9cf0c

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dyj65s59.exe
                    Filesize

                    395KB

                    MD5

                    cfd9fd906ad91a1f8e95e9629b589e4d

                    SHA1

                    1bd0d089b9c491f18cd738d73933b70ce2e35f6a

                    SHA256

                    35bd0e6db97e955e502ca62513ed082b9b8dc3f2972cd6b95c275a1f0b131af3

                    SHA512

                    611a5e0706b30016926c3296a9596ab46ae7ed684d5ba6e9013cc3beaf8a35f7802c15179cf6e76304380e1aa70f294fccf6bf56042f910d7d161f2188b9cf0c

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0208.exe
                    Filesize

                    347KB

                    MD5

                    bfc4d9091d7aab8fca7c342c522a086a

                    SHA1

                    19e83b3a193edb7f8848546c3626875b718b2f57

                    SHA256

                    ba58846c3008b5ea1e9c49ff433ef6dbbd68c12f5dfd858beaaf7d9e86dfc362

                    SHA512

                    79b63e61757b0a7d40f4b0f29ac68dd4146e24fbffbf4e8ad620acb307c5ea622644ccbdb0f812fc2e9e88c2d8c8b0dfd60b163a021448a6c77cf430d6e4f290

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0208.exe
                    Filesize

                    347KB

                    MD5

                    bfc4d9091d7aab8fca7c342c522a086a

                    SHA1

                    19e83b3a193edb7f8848546c3626875b718b2f57

                    SHA256

                    ba58846c3008b5ea1e9c49ff433ef6dbbd68c12f5dfd858beaaf7d9e86dfc362

                    SHA512

                    79b63e61757b0a7d40f4b0f29ac68dd4146e24fbffbf4e8ad620acb307c5ea622644ccbdb0f812fc2e9e88c2d8c8b0dfd60b163a021448a6c77cf430d6e4f290

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus1247.exe
                    Filesize

                    11KB

                    MD5

                    7e93bacbbc33e6652e147e7fe07572a0

                    SHA1

                    421a7167da01c8da4dc4d5234ca3dd84e319e762

                    SHA256

                    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                    SHA512

                    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus1247.exe
                    Filesize

                    11KB

                    MD5

                    7e93bacbbc33e6652e147e7fe07572a0

                    SHA1

                    421a7167da01c8da4dc4d5234ca3dd84e319e762

                    SHA256

                    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                    SHA512

                    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con8568.exe
                    Filesize

                    337KB

                    MD5

                    6e8158adb9701e11d91308856283b4ee

                    SHA1

                    c9e2286d40fcaef9116414504c9ec14d6b4a80d7

                    SHA256

                    f04fd301a06b5f0d523569fd18053e2352373aa68330183b6b9de4385849d322

                    SHA512

                    8baba867b5f3bc4ba336b2454862cdeee4682c855e33ee4076bc9167f78f3be84992e764591e9092240c54decf761a52f1bc4e0235311afdb7739480c4d42bdc

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con8568.exe
                    Filesize

                    337KB

                    MD5

                    6e8158adb9701e11d91308856283b4ee

                    SHA1

                    c9e2286d40fcaef9116414504c9ec14d6b4a80d7

                    SHA256

                    f04fd301a06b5f0d523569fd18053e2352373aa68330183b6b9de4385849d322

                    SHA512

                    8baba867b5f3bc4ba336b2454862cdeee4682c855e33ee4076bc9167f78f3be84992e764591e9092240c54decf761a52f1bc4e0235311afdb7739480c4d42bdc

                  • memory/220-1144-0x00000000004E0000-0x0000000000512000-memory.dmp
                    Filesize

                    200KB

                  • memory/220-1145-0x0000000004DF0000-0x0000000004E00000-memory.dmp
                    Filesize

                    64KB

                  • memory/232-163-0x0000000000DF0000-0x0000000000DFA000-memory.dmp
                    Filesize

                    40KB

                  • memory/748-165-0x0000000004B90000-0x0000000004C92000-memory.dmp
                    Filesize

                    1.0MB

                  • memory/748-164-0x0000000000400000-0x0000000002BE7000-memory.dmp
                    Filesize

                    39.9MB

                  • memory/748-134-0x0000000004B90000-0x0000000004C92000-memory.dmp
                    Filesize

                    1.0MB

                  • memory/2548-180-0x0000000004B70000-0x0000000004B82000-memory.dmp
                    Filesize

                    72KB

                  • memory/2548-190-0x0000000004B70000-0x0000000004B82000-memory.dmp
                    Filesize

                    72KB

                  • memory/2548-192-0x0000000004B70000-0x0000000004B82000-memory.dmp
                    Filesize

                    72KB

                  • memory/2548-194-0x0000000004B70000-0x0000000004B82000-memory.dmp
                    Filesize

                    72KB

                  • memory/2548-196-0x0000000004B70000-0x0000000004B82000-memory.dmp
                    Filesize

                    72KB

                  • memory/2548-198-0x0000000004B70000-0x0000000004B82000-memory.dmp
                    Filesize

                    72KB

                  • memory/2548-200-0x0000000004B70000-0x0000000004B82000-memory.dmp
                    Filesize

                    72KB

                  • memory/2548-202-0x0000000004B70000-0x0000000004B82000-memory.dmp
                    Filesize

                    72KB

                  • memory/2548-204-0x0000000000400000-0x0000000002B05000-memory.dmp
                    Filesize

                    39.0MB

                  • memory/2548-188-0x0000000004B70000-0x0000000004B82000-memory.dmp
                    Filesize

                    72KB

                  • memory/2548-206-0x0000000000400000-0x0000000002B05000-memory.dmp
                    Filesize

                    39.0MB

                  • memory/2548-186-0x0000000004B70000-0x0000000004B82000-memory.dmp
                    Filesize

                    72KB

                  • memory/2548-184-0x0000000004B70000-0x0000000004B82000-memory.dmp
                    Filesize

                    72KB

                  • memory/2548-182-0x0000000004B70000-0x0000000004B82000-memory.dmp
                    Filesize

                    72KB

                  • memory/2548-178-0x0000000004B70000-0x0000000004B82000-memory.dmp
                    Filesize

                    72KB

                  • memory/2548-176-0x0000000004B70000-0x0000000004B82000-memory.dmp
                    Filesize

                    72KB

                  • memory/2548-175-0x0000000004B70000-0x0000000004B82000-memory.dmp
                    Filesize

                    72KB

                  • memory/2548-174-0x0000000007330000-0x0000000007340000-memory.dmp
                    Filesize

                    64KB

                  • memory/2548-173-0x0000000007330000-0x0000000007340000-memory.dmp
                    Filesize

                    64KB

                  • memory/2548-172-0x0000000007340000-0x00000000078E4000-memory.dmp
                    Filesize

                    5.6MB

                  • memory/2548-171-0x0000000002C60000-0x0000000002C8D000-memory.dmp
                    Filesize

                    180KB

                  • memory/4796-213-0x0000000007100000-0x000000000713E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4796-230-0x0000000007210000-0x0000000007220000-memory.dmp
                    Filesize

                    64KB

                  • memory/4796-232-0x0000000007210000-0x0000000007220000-memory.dmp
                    Filesize

                    64KB

                  • memory/4796-231-0x0000000007100000-0x000000000713E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4796-234-0x0000000007100000-0x000000000713E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4796-236-0x0000000007100000-0x000000000713E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4796-238-0x0000000007100000-0x000000000713E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4796-240-0x0000000007100000-0x000000000713E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4796-242-0x0000000007100000-0x000000000713E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4796-244-0x0000000007100000-0x000000000713E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4796-246-0x0000000007100000-0x000000000713E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4796-1122-0x00000000077D0000-0x0000000007DE8000-memory.dmp
                    Filesize

                    6.1MB

                  • memory/4796-1123-0x0000000007DF0000-0x0000000007EFA000-memory.dmp
                    Filesize

                    1.0MB

                  • memory/4796-1124-0x0000000007F00000-0x0000000007F12000-memory.dmp
                    Filesize

                    72KB

                  • memory/4796-1125-0x0000000007F20000-0x0000000007F5C000-memory.dmp
                    Filesize

                    240KB

                  • memory/4796-1126-0x0000000007210000-0x0000000007220000-memory.dmp
                    Filesize

                    64KB

                  • memory/4796-1128-0x0000000008210000-0x00000000082A2000-memory.dmp
                    Filesize

                    584KB

                  • memory/4796-1129-0x00000000082B0000-0x0000000008316000-memory.dmp
                    Filesize

                    408KB

                  • memory/4796-1130-0x00000000089A0000-0x0000000008A16000-memory.dmp
                    Filesize

                    472KB

                  • memory/4796-1131-0x0000000008A40000-0x0000000008A90000-memory.dmp
                    Filesize

                    320KB

                  • memory/4796-1132-0x0000000007210000-0x0000000007220000-memory.dmp
                    Filesize

                    64KB

                  • memory/4796-1133-0x0000000007210000-0x0000000007220000-memory.dmp
                    Filesize

                    64KB

                  • memory/4796-1134-0x0000000007210000-0x0000000007220000-memory.dmp
                    Filesize

                    64KB

                  • memory/4796-1136-0x0000000009070000-0x0000000009232000-memory.dmp
                    Filesize

                    1.8MB

                  • memory/4796-1137-0x0000000009240000-0x000000000976C000-memory.dmp
                    Filesize

                    5.2MB

                  • memory/4796-1139-0x0000000007210000-0x0000000007220000-memory.dmp
                    Filesize

                    64KB

                  • memory/4796-228-0x0000000007210000-0x0000000007220000-memory.dmp
                    Filesize

                    64KB

                  • memory/4796-227-0x0000000007100000-0x000000000713E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4796-225-0x0000000007100000-0x000000000713E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4796-223-0x0000000007100000-0x000000000713E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4796-221-0x0000000007100000-0x000000000713E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4796-219-0x0000000007100000-0x000000000713E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4796-217-0x0000000007100000-0x000000000713E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4796-215-0x0000000007100000-0x000000000713E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4796-212-0x0000000007100000-0x000000000713E000-memory.dmp
                    Filesize

                    248KB

                  • memory/4796-211-0x0000000002C90000-0x0000000002CDB000-memory.dmp
                    Filesize

                    300KB